top of page
webarmor

Web·Armor®

Additional Layer of Encryption on the Internet

Double layer of information

through HTTPS

Web·Armor® is an innovative JavaScript library developed by Cyte® that facilitates the implementation of cryptographic operations on both the client and server sides.

This versatile tool can be employed in mobile applications, web browsers (frontend), and servers (backend), ensuring the security of information transmitted across various devices and platforms.

The library offers user-friendly methods for web and mobile application developers, enabling the integration of encryption algorithms, authentication, hashing, and random number generation, among others.

Its primary objective is to provide defence in depth, applying multiple layers of cryptographic protection beyond standard measures like TLS.

Web•Armor® implements a cross-platform server that can operate either in the cloud or locally and is compatible with any operating system. On the frontend of web or mobile applications, the library's client is deployed. Together, the server and client securely perform key calculations using ECC and ZKP, enabling the encryption of sensitive data in transit.

This creates an additional layer of security with advanced cryptographic algorithms, preventing attacks in the event of vulnerabilities in TLS/SSL or unauthorised access to stored data.

This solution is specifically designed for large organisations, such as banks, that need to secure their web and mobile applications but lack the time or expertise to correctly implement the appropriate cryptographic primitives. Web•Armor® simplifies this process by offering a wide range of algorithms and easy-to-use implementation methods.

Among the cryptographic primitives offered by Web•Armor® are:

webarmor_edited.jpg

Encryption and Authentication Algorithms

Web•Armor® offers both symmetric and asymmetric algorithms to ensure the confidentiality and authentication of information. Symmetric algorithms, such as AES, are ideal for encrypting files and data whether at rest or in transit. Elliptic curve asymmetric algorithms, such as ECDSA, ECC-ElGamal, and ECIES, enable efficient authentication and verification of information integrity, accommodating a wide range of use cases.

Hash and Key Generation

The library includes methods for generating hashes using SHA256 or SHA512, which are essential for cryptographic operations such as encryption, signing, and authentication. Additionally, it offers HOTP and TOTP protocols for generating one-time passwords (OTP), commonly used as a second factor of authentication, thereby enhancing security when accessing critical applications.

webarmor_edited.jpg
webarmor

Pseudo-randomness and Cryptographic Security

Web•Armor® ensures the correct implementation of cryptographic algorithms by providing methods to obtain secure pseudo-random values (PRNG). These values are fundamental to the robustness of cryptographic algorithms and the generation of secure keys, guaranteeing the integrity of cryptographic processes.

Message Integrity and Key Derivation

Message integrity is ensured through the use of hash-based message authentication codes (HMAC). The library also enables key derivation based on HMAC (HKDF), ensuring unique and secure cryptographic keys, preventing key reuse, and improving the management of multiple keys.

webarmor
webarmor

Zero Knowledge Algorithms

Web•Armor® includes implementations of Zero Knowledge Proof (ZKP) algorithms, which allow information verification without revealing the original data. This feature is crucial for protecting privacy and ensuring the authenticity of transactions without compromising the security of the information.

Provide an additional layer of encryption for your company

Double layer encryption

Professional Support

Schedule a Demonstration

bottom of page